You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/domain-joined/apache-domain-joined-create-configure-enterprise-security-cluster.md
+21-19Lines changed: 21 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,33 +4,33 @@ description: Learn how to create and configure Enterprise Security Package clust
4
4
services: hdinsight
5
5
ms.service: azure-hdinsight
6
6
ms.topic: how-to
7
-
ms.date: 11/20/2024
7
+
ms.date: 09/06/2024
8
8
ms.custom: devx-track-azurepowershell
9
9
---
10
10
11
11
# Create and configure Enterprise Security Package clusters in Azure HDInsight
12
12
13
-
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Microsoft Entra ID-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
13
+
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Active Directory-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
14
14
15
-
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Microsoft Entra ID and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
15
+
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Active Directory and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
16
16
17
17
The server you create will act as a replacement for your *actual* on-premises environment. You'll use it for the setup and configuration steps. Later you'll repeat the steps in your own environment.
18
18
19
19
This guide will also help you create a hybrid identity environment by using password hash sync with Microsoft Entra ID. The guide complements [Use ESP in HDInsight](apache-domain-joined-architecture.md).
20
20
21
21
Before you use this process in your own environment:
22
22
23
-
* Set up Microsoft Entra ID and DNS.
23
+
* Set up Active Directory and DNS.
24
24
* Enable Microsoft Entra ID.
25
25
* Sync on-premises user accounts to Microsoft Entra ID.
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Microsoft Entra ID forest.
31
+
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Active Directory forest.
32
32
33
-
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Microsoft Entra ID forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
33
+
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Active Directory forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
34
34
35
35
1. Select **Deploy to Azure**.
36
36
1. Sign in to your Azure subscription.
@@ -65,15 +65,15 @@ In this section, you'll create the users that will have access to the HDInsight
65
65
1. Enter the password that you chose for the admin account.
66
66
1. Select **OK**.
67
67
68
-
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Microsoft Entra ID Users and Computers**.
68
+
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Active Directory Users and Computers**.
69
69
70
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Microsoft Entra ID Management." border="true":::
70
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Active Directory Management." border="true":::
71
71
72
72
1. Create two new users: **HDIAdmin** and **HDIUser**. These two users will sign in to HDInsight clusters.
73
73
74
-
1. From the **Microsoft Entra ID Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
74
+
1. From the **Active Directory Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
75
75
76
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Microsoft Entra ID user." border="true":::
76
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Active Directory user." border="true":::
77
77
78
78
1. On the **New Object - User** page, enter `HDIUser` for **First name** and **User logon name**. The other fields will autopopulate. Then select **Next**.
79
79
@@ -87,13 +87,13 @@ In this section, you'll create the users that will have access to the HDInsight
87
87
88
88
1. Create a security group.
89
89
90
-
1. From **Microsoft Entra ID Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
90
+
1. From **Active Directory Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
91
91
92
92
1. Enter `HDIUserGroup` in the **Group name** text box.
93
93
94
94
1. Select **OK**.
95
95
96
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Microsoft Entra ID group." border="true":::
96
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Active Directory group." border="true":::
97
97
98
98
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0028.png" alt-text="Create a new object." border="true":::
99
99
@@ -105,7 +105,7 @@ In this section, you'll create the users that will have access to the HDInsight
105
105
106
106
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/active-directory-add-users-to-group.png" alt-text="Add the member HDIUser to the group HDIUserGroup." border="true":::
107
107
108
-
You've now created your Microsoft Entra ID environment. You've added two users and a user group that can access the HDInsight cluster.
108
+
You've now created your Active Directory environment. You've added two users and a user group that can access the HDInsight cluster.
109
109
110
110
The users will be synchronized with Microsoft Entra ID.
111
111
@@ -141,9 +141,9 @@ The users will be synchronized with Microsoft Entra ID.
141
141
142
142
## Configure your Microsoft Entra tenant
143
143
144
-
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Microsoft Entra ID instance to the cloud.
144
+
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Active Directory instance to the cloud.
145
145
146
-
Create a Microsoft Entra ID tenant administrator.
146
+
Create an Active Directory tenant administrator.
147
147
148
148
1. Sign in to the Azure portal and select your Microsoft Entra tenant, **HDIFabrikam**.
149
149
@@ -171,6 +171,8 @@ Create a Microsoft Entra ID tenant administrator.
171
171
1. Select **User**.
172
172
1. Select **Administrator**, and then **Select**.
173
173
174
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/azure-ad-add-role-member.png" alt-text="The Microsoft Entra role dialog box." border="true":::
175
+
174
176
1. Select **Create**.
175
177
176
178
1. Then have the new user sign in to the Azure portal where it will be prompted to change the password. You'll need to do this before configuring Microsoft Entra Connect.
@@ -189,11 +191,11 @@ Create a Microsoft Entra ID tenant administrator.
189
191
190
192
1. Select **Use express settings**.
191
193
192
-
1. On the **Connect to Microsoft Entra ID** page, enter the username and password. Use the username `[email protected]`. Then select **Next**.
194
+
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the administrator for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your Active Directory tenant. Then select **Next**.
193
195
194
196
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0058.png" alt-text="Connect to Microsoft Entra ID." border="true":::
195
197
196
-
1. On the **Connect to Microsoft Entra ID Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
198
+
1. On the **Connect to Active Directory Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
197
199
198
200
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0060.png" alt-text="Connect to A D D S page." border="true":::
199
201
@@ -423,11 +425,11 @@ This step requires the following prerequisites:
423
425
424
426
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0137.jpg" alt-text="Assign the cluster admin role to hdiusergroup." border="true":::
425
427
426
-
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Microsoft Entra ID instance.
428
+
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Active Directory instance.
427
429
428
430
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0139.jpg" alt-text="Sign in to the cluster by using the SSH client." border="true":::
429
431
430
-
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Microsoft Entra ID instance.
432
+
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Active Directory instance.
0 commit comments